Vulnerability Management Software

Find the best Vulnerability Management Software for your business. Compare product reviews and features to build your list.

What is Vulnerability Management Software?

Filter Results (59)

Product Rating

Users

Deployment

Features

Why Capterra is free

Skybox Vulnerability Control supports a systematic approach to vulnerability management unlike any other vendor. Our solution is rooted in comprehensive visibility of your attack surface, using its context to analyze, prioritize and remediate your riskiest vulnerabilities fast. Learn more about Vulnerability Control

Identify and prioritize risks to your network with comprehensive vulnerability scanning and analytics solutions. Learn more about Vulnerability Control

We provide an end-to-end Software Security platform to bring you objective data so you can make informed decisions regarding the security risks faced by your applications. We make tough decisions easier and this translates in cost reduction, risk mitigation, objective measurement, with the broadest language coverage and third party intergations to name but a few of the possibilities brought about by our platform. SAST and open source management of your entire portfolio. Learn more about Kiuwan

DevSecOps platform with SAST and SCA, IDE integration and distributed analysis to shield your applications from external threats Learn more about Kiuwan

Streamline the aggregation and correlation of asset, threat, vulnerability and ticket data. Gain better visibility into your organization's risk posture with advanced risk scoring algorithms that provide business context beyond CVSS scores, such as asset criticality. Help your IT team prioritize the right vulnerabilities and effectively communicate progress to all your stakeholders. Easily scale these processes to millions of assets and tens of millions of cyber vulnerabilities. Learn more about Vulnerability Management Software

Gain greater risk intelligence by prioritizing your cyber vulnerabilities based on business criticality for more efficient remediation. Learn more about Vulnerability Management Software

Intruder

by Intruder

Intruder finds weaknesses in your online digital estate, explains the risks, & helps with remediation before a breach can occur. Cloud Connectors for AWS, Google Cloud and Azure help you synchronise your systems, so no stone gets left unturned. Developer integrations with Slack and Jira make keeping up to date a breeze. Learn more about Intruder

Intruder finds weaknesses in your online digital estate, explains the risks, & helps with remediation before a breach can occur. Learn more about Intruder

NorthStar

by Conventus

An automated, integrated, data-driven platform that provides the most effective method of prioritizing and remediating the vulnerabilities and exposures that represent the greatest risk to your business. NorthStars flexible scoring model empowers organizations with the freedom and transparency to decide what factors best reflect their business needs and risk appetite. NorthStar Delivers: - Single Source of Truth - Completely customizable scoring - Simplified and Faster Data Integrations Learn more about NorthStar

Prioritize and remediate the vulnerabilities and exposures that matter most to your business. Learn more about NorthStar

Alert Logic's SIEMless Threat Management offering seamlessly connects an award-winning security platform, threat intelligence & expert defenders to provide the right level of security & compliance coverage for the right resources across your environments. Choose your level of coverage for asset discovery, vulnerability scanning, cloud configuration checks, threat monitoring, intrusion detection, log collection & monitoring, WAF defense & more - with 24/7 support & SOC services. Learn more about Alert Logic Vulnerability Mgmt

Get Vulnerability Management as part of Alert Logic's SIEMless Threat Management offerings, connecting platform, intel & experts. Learn more about Alert Logic Vulnerability Mgmt

Protect your website or web application 365 days a year thanks to daily automated audits to detect your security flaws. Adopt the Offensive Cyber Security method to protect your business. Discover the high-performance web vulnerability scanner by HTTPCS: - Zero False Positive Guarantee - 100% Mapping (Headless Technology to crawl dynamic content) - Security Flaws listing : Top 10 OWASP, CVE and much more! - Countermeasures to apply - Replay the attacks to understand the risks incurred. Learn more about HTTPCS Security

Without technical expertise, run automated security audits to detect security flaws on your site or web application. Support provided. Learn more about HTTPCS Security

Cryptosense

by Cryptosense

Cryptosense Analyzer software helps our customers find security weaknesses in the cryptography they use in their infrastructure and applications, and then fix them before they are exploited. We trace crypto use in applications, network protocols and cryptographic hardware, and pass it through our analysis algorithms to find vulnerabilities in key management, randomness generation, crypto use and more. Learn more about Cryptosense

Cryptosense provides software to detect and eliminate vulnerabilities caused by misuses of cryptography in apps and infrastructures. Learn more about Cryptosense

Patch Manager Plus is an automated patch management software that provides enterprises with a single interface for all patch management tasks. Works across platforms, helping you patch Windows, Mac, Linux & 300+ third-party applications. You can automate the scan for missing patches, test & approve for hassle-free patching, customize deployment policies to meet business needs, decline patches & generate vulnerability reports. Patch Manager Plus is now available both on cloud and on-premise. Learn more about Patch Manager Plus

Patch Manager Plus is an automated patch management software to patch Windows, Mac, Linux updates and 300+ third-party applications. Learn more about Patch Manager Plus

Integrates and correlates vulnerability scanners data and multiple exploit feeds combined with business and IT factors and to prioritize cyber security risks. Helps CISO, Red Teams and Vulnerability Assessment Teams reduce time-to-fix, prioritize and report risks. Used by Governments, Military, Banking, Finance, and E-Commerce companies Learn more about Centraleyezer

Vulnerability Management that facilitates collaboration between Security Analysts, Management and Asset Owners and risk prioritization. Learn more about Centraleyezer

Nessus

by Tenable Network Security

Built for security practitioners, by security professionals, Nessus Professional is the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to help security professionals quickly identify and fix vulnerabilities, including software flaws, missing patches, malware, and misconfigurations. With features such as pre-built policies and templates, group snooze functionality, and real-time updates, it makes vulnerability assessment easy and intuitive. Learn more about Nessus

Nessus Pro, the industry leader in vulnerability assessment, helps you quickly and easily identify and fix vulnerabilities. Learn more about Nessus

With Vulnerability Manager Plus, right from detection, and assessment of vulnerabilities to eliminating them with an automated patching workflow, all aspects of vulnerability management are made easy with a centralized console. You can also manage security configurations, harden web servers, mitigate zero-day vulnerabilities, run end-of-life audits, and eliminate risky software. Simplify vulnerability management with remotely deployable agent, web based interface and endless scalability. Learn more about ManageEngine Vulnerability Manager Plus

An easy to deploy, affordable, centralized console based tool to prioritize and eliminate vulnerabilities and misconfigurations. Learn more about ManageEngine Vulnerability Manager Plus

DriveStrike

by DriveStrike

Computer & mobile remote wipe, lock, and locate for all operating systems and hardware. Learn more about DriveStrike

Computer & mobile remote wipe, lock, and locate for all operating systems and hardware. Learn more about DriveStrike

Acunetix

by Acunetix

Acunetix leads the market in automatic web security testing technology that scans and audits all web applications including HTML5, JavaScript and Single Page Applications. Scans for 4500 vulnerabilities incl. SQLi and XSS among others. Used by Government, Military, Education, Telecommunications, Banking, Finance, and E-Commerce sectors, including many Fortune 500 companies. Acunetix offers a cost-effective, simple, scalable, and high availability solution. Available on Windows, Linux and Online Learn more about Acunetix

Vulnerability Management solution that scans your website, detects vulnerabilities like XSS or SQL Injection and offers remediation Learn more about Acunetix

Netsparker Security Scanner is an accurate solution that automatically identifies XSS, SQL Injection and other vulnerabilities in web applications. Netsparker's unique Proof-Based Scanning Technology allows you to allocate more time to fix the reported flaws by automatically exploiting the identified vulnerabilities in a read-only and safe way, and also produces a proof of exploitation. Therefore you can immediately see the impact of the vulnerability and do not have to manually verify it. Learn more about Netsparker Security Scanner

Accurate solution that automatically identifies XSS, SQL Injection and other vulnerabilities in web applications. Learn more about Netsparker Security Scanner

Market leading vulnerability management solution providing complete ecosystem visibility, prioritized & automated remediation workflows Learn more about InsightVM

Market leading vulnerability management solution providing complete ecosystem visibility, prioritized & automated remediation workflows Learn more about InsightVM

Security management platform offering fully integrated security controls for threat detection and compliance management. Learn more about AlienVault USM

Security management platform offering fully integrated security controls for threat detection and compliance management. Learn more about AlienVault USM

Probely

by Probely

Cloud-based tool that helps manage vulnerabilities and security issues in web applications and provides guidance on how to fix them. Learn more about Probely

Cloud-based tool that helps manage vulnerabilities and security issues in web applications and provides guidance on how to fix them. Learn more about Probely

Open source security platform that helps find and remediate riska and vulnerabilities across business environments. Learn more about Snyk

Open source security platform that helps find and remediate riska and vulnerabilities across business environments. Learn more about Snyk

OpenVAS

by Greenbone Networks GmbH

A set of SSL-secured vulnerability management tools including system scanner and access control manager. Learn more about OpenVAS

A set of SSL-secured vulnerability management tools including system scanner and access control manager. Learn more about OpenVAS

Vulnerability management system which scans the current network, analyzes risks, and prepares reports through constant monitoring. Learn more about Qualys VM

Vulnerability management system which scans the current network, analyzes risks, and prepares reports through constant monitoring. Learn more about Qualys VM

FireMon

by FireMon

FireMon delivers real-time visibility into and control over complex network security infrastructures, policies and risk postures. Learn more about FireMon

FireMon delivers real-time visibility into and control over complex network security infrastructures, policies and risk postures. Learn more about FireMon

ArcSight

by Micro Focus

User behavior analytics and vulnerability management solution that helps identify internal and external threats. Learn more about ArcSight

User behavior analytics and vulnerability management solution that helps identify internal and external threats. Learn more about ArcSight

HackerOne

by HackerOne

THE MOST TRUSTED HACKER-POWERED SECURITY PLATFORM - From implementing the basics of a vulnerability disclosure process to supercharging Learn more about HackerOne

THE MOST TRUSTED HACKER-POWERED SECURITY PLATFORM - From implementing the basics of a vulnerability disclosure process to supercharging Learn more about HackerOne

Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software. Learn more about Saint Security Suite

Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software. Learn more about Saint Security Suite

baramundi Management Suite

by baramundi Software USA

Automatic scanning and dashboard assessment of PC and server vulnerabilities. Ensure continuous security with patch/update management. Learn more about baramundi Management Suite

Automatic scanning and dashboard assessment of PC and server vulnerabilities. Ensure continuous security with patch/update management. Learn more about baramundi Management Suite

Hybrid approach to vulnerability scanning with accurate security assessment results. Learn more about SaaS Vulnerability Scanner

Hybrid approach to vulnerability scanning with accurate security assessment results. Learn more about SaaS Vulnerability Scanner

Twistlock

by Twistlock

Twistlock is the leading cloud native cybersecurity platform for the modern enterprise Learn more about Twistlock

Twistlock is the leading cloud native cybersecurity platform for the modern enterprise Learn more about Twistlock

AppScanOnline

by AppScanOnline

Helps you find the code vulnerabilities and secure your app. Learn more about AppScanOnline

Helps you find the code vulnerabilities and secure your app. Learn more about AppScanOnline

Attack probability analysis tool that helps predict hacking attacks and develop prevention schemes. Learn more about AttackTree

Attack probability analysis tool that helps predict hacking attacks and develop prevention schemes. Learn more about AttackTree

Brinqa

by Brinqa

Leverages a company's existing investment in systems, security & governance programs to mitigate, remediate and avoid risk. Learn more about Brinqa

Leverages a company's existing investment in systems, security & governance programs to mitigate, remediate and avoid risk. Learn more about Brinqa

Continuity Engine is a business continuity software that protects your most mission-critical applications with a goal of zero downtime. Learn more about Continuity Engine

Continuity Engine is a business continuity software that protects your most mission-critical applications with a goal of zero downtime. Learn more about Continuity Engine

CxSAST

by CHECKMARX

Checkmarx is a provider of state-of-the-art web application security solution: static code analysis software. Learn more about CxSAST

Checkmarx is a provider of state-of-the-art web application security solution: static code analysis software. Learn more about CxSAST

An entry point for implementing structure and diligence in the management of a cybersecurity program Learn more about Cybersecurity Risk Manager

An entry point for implementing structure and diligence in the management of a cybersecurity program Learn more about Cybersecurity Risk Manager

Cyberwatch

by Cyberwatch

Server vulnerability monitoring solution with integrated patch management functionality. Learn more about Cyberwatch

Server vulnerability monitoring solution with integrated patch management functionality. Learn more about Cyberwatch

DefectDojo

by 10Security

Security program and vulnerability management tool that allows you to manage your application security program. Learn more about DefectDojo

Security program and vulnerability management tool that allows you to manage your application security program. Learn more about DefectDojo

Demisto

by Demisto

An on-prem and hosted solution that enables standardized, coordinated responses across your security product stack. Learn more about Demisto

An on-prem and hosted solution that enables standardized, coordinated responses across your security product stack. Learn more about Demisto

DigitalDefense

by DigitalDefense

Quickly, comprehensively and accurately assess endpoints and servers for operating system and application vulnerabilities. Learn more about DigitalDefense

Quickly, comprehensively and accurately assess endpoints and servers for operating system and application vulnerabilities. Learn more about DigitalDefense

Agentless technology for automating discovery and monitoring of networks, servers, and other applications in varied environments. Learn more about Elastic Detector

Agentless technology for automating discovery and monitoring of networks, servers, and other applications in varied environments. Learn more about Elastic Detector

EndGame

by EndGame

Endpoint protection platform that reduces the cost and complexity of your endpoint environment. Learn more about EndGame

Endpoint protection platform that reduces the cost and complexity of your endpoint environment. Learn more about EndGame

Humming Heads

by Humming Heads

Humming Heads Evolution DLP provides strong encryption, detailed forensic tools, kernel-level whitelisting, and robust write controls. Learn more about Humming Heads

Humming Heads Evolution DLP provides strong encryption, detailed forensic tools, kernel-level whitelisting, and robust write controls. Learn more about Humming Heads

Kenna

by Kenna Security

Kenna Security uses exploit intelligence feeds to identify vulnerabilities being exploited in the wild and put your company at risk. Learn more about Kenna

Kenna Security uses exploit intelligence feeds to identify vulnerabilities being exploited in the wild and put your company at risk. Learn more about Kenna

Mageni

by Mageni Security

Mageni is a powerful vulnerability management solution that empowers you to find, prioritize, remediate and manage vulnerabilities. Learn more about Mageni

Mageni is a powerful vulnerability management solution that empowers you to find, prioritize, remediate and manage vulnerabilities. Learn more about Mageni

Praetorian

by Praetorian

Our solutions enable clients to find, fix, stop, and solve cybersecurity problems across their enterprise and product portfolios. Learn more about Praetorian

Our solutions enable clients to find, fix, stop, and solve cybersecurity problems across their enterprise and product portfolios. Learn more about Praetorian

reshift

by Software Secured

SaaS-based software platform that helps software development teams identify more vulnerabilities faster in their own code. Learn more about reshift

SaaS-based software platform that helps software development teams identify more vulnerabilities faster in their own code. Learn more about reshift

RiskSense

by RiskSense

FROM MAYHEM TO MEASURABLE. Take Control of Your Cyber Risk. Risk-Based Vulnerability Management. Learn more about RiskSense

FROM MAYHEM TO MEASURABLE. Take Control of Your Cyber Risk. Risk-Based Vulnerability Management. Learn more about RiskSense

Scan engine that identifies external network vulnerabilities: add/remove targets, control frequency, and review results. Learn more about SecurityMetrics Perimeter Scan

Scan engine that identifies external network vulnerabilities: add/remove targets, control frequency, and review results. Learn more about SecurityMetrics Perimeter Scan

Sentinel IPS

by Sentinel IPS

Sentinel intrusion detection & prevention systems keep malware, ransomware and many other network attacks from impacting your business. Learn more about Sentinel IPS

Sentinel intrusion detection & prevention systems keep malware, ransomware and many other network attacks from impacting your business. Learn more about Sentinel IPS

Continuous vulnerability management solution that combines automated scanning, manual penetration testing and app learning. Learn more about SWAT - the Secure Web Application Tactics

Continuous vulnerability management solution that combines automated scanning, manual penetration testing and app learning. Learn more about SWAT - the Secure Web Application Tactics

Add-on that allows organizations to perform supervisory review of broker-dealer email to ensure compliance with regulatory bodies. Learn more about Symantec Control Compliance Suite

Add-on that allows organizations to perform supervisory review of broker-dealer email to ensure compliance with regulatory bodies. Learn more about Symantec Control Compliance Suite

ThreadFix

by Denim Group

Provides comprehensive view of vulnerabilities and risks from applications. Learn more about ThreadFix

Provides comprehensive view of vulnerabilities and risks from applications. Learn more about ThreadFix

Vulnerability management solution that can be integrated with other IT security means and used for eventual threat prevention. Learn more about Threat and Vulnerability Management App

Vulnerability management solution that can be integrated with other IT security means and used for eventual threat prevention. Learn more about Threat and Vulnerability Management App

TraceInsight

by TraceSecurity

A software tool that empowers you to reduce vulnerability with minimal resources. Learn more about TraceInsight

A software tool that empowers you to reduce vulnerability with minimal resources. Learn more about TraceInsight

Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and more. Learn more about Unified VRM

Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and more. Learn more about Unified VRM

Vulnerability management app that reveals weaknesses of working network, prioritizes them, and selects appropriate level of security. Learn more about Veracode Vulnerability Management

Vulnerability management app that reveals weaknesses of working network, prioritizes them, and selects appropriate level of security. Learn more about Veracode Vulnerability Management

VigiTrust

by VigiTrust

Security accreditation management system that helps organizations comply with information security regulations. Learn more about VigiTrust

Security accreditation management system that helps organizations comply with information security regulations. Learn more about VigiTrust

Vulnerability Management allows IT security professionals to scan working system, detect weaknesses, and prevent intrusions. Learn more about Vulnerability Management

Vulnerability Management allows IT security professionals to scan working system, detect weaknesses, and prevent intrusions. Learn more about Vulnerability Management

WP Hacked Help

by WP Hacked Help

Security Scanner for Wordpress Installations to test vulnerabilities using custom technology to check Wordpress websites Learn more about WP Hacked Help

Security Scanner for Wordpress Installations to test vulnerabilities using custom technology to check Wordpress websites Learn more about WP Hacked Help

Filter Results (59)

Product Rating

Users

Deployment

Features


What is Vulnerability Management Software?

Vulnerability Management software helps to predict, identify, and fix potential corporate cybersecurity bridges.


Loading...